General

  • Target

    57ae9acddea94e91438697ff1c595845

  • Size

    673KB

  • Sample

    240113-cctg2shhfj

  • MD5

    57ae9acddea94e91438697ff1c595845

  • SHA1

    2b8b0399de86cd0751a836621afe4b9c4d84f0e3

  • SHA256

    5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210

  • SHA512

    c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9

  • SSDEEP

    12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.club
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hcx8knJINooP

Targets

    • Target

      57ae9acddea94e91438697ff1c595845

    • Size

      673KB

    • MD5

      57ae9acddea94e91438697ff1c595845

    • SHA1

      2b8b0399de86cd0751a836621afe4b9c4d84f0e3

    • SHA256

      5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210

    • SHA512

      c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9

    • SSDEEP

      12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks